Research Article

A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain

Algorithm 3

Data Sharing.
1: Input:
2: Output:
3: DU obtains ’s public key for validating , compares and .
4: ifthen
5: ifthen
6:  It indicates that is correct, let implies current time, computes and signs to get , in which represents the data to be sent by , when does not modify . Next, computes .
7:  else
8:   It indicates that there is a malicious DU that modifies the data, executes 4 to find the malicious DU.
9:  end if
10: else
11:  Request data again.
12: end if
   return